Should I block it?

16%
16% of PCs block this file from running.

Relationships


PE structurePE file structure

Show functions
Import table
advapi32.dll
RegQueryInfoKeyW, RegOpenKeyExW, RegQueryValueExW, RegCloseKey, GetTraceEnableFlags, GetTraceEnableLevel, GetTraceLoggerHandle, RegisterTraceGuidsW, UnregisterTraceGuids, RegNotifyChangeKeyValue, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegSetKeySecurity, ImpersonateSelf, OpenThreadToken, IsValidSid, TraceEvent, RegEnumKeyExW, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, GetLengthSid, InitializeAcl, AddAccessAllowedAce, SetSecurityDescriptorDacl, GetTokenInformation, InitializeSecurityDescriptor, SetSecurityDescriptorOwner, RegGetKeySecurity
kernel32.dll
SetErrorMode, ReadFile, QueryPerformanceCounter, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlUnwind, DebugBreak, GetThreadLocale, GetUserDefaultLCID, GetSystemDefaultLCID, TerminateProcess, Sleep, DeleteCriticalSection, LocalFree, LocalAlloc, FreeLibrary, GetProcAddress, LoadLibraryW, LeaveCriticalSection, EnterCriticalSection, InterlockedCompareExchange, InterlockedExchange, TlsSetValue, TlsGetValue, GetLastError, GetSystemDirectoryW, TlsFree, CloseHandle, TlsAlloc, CreateEventW, InitializeCriticalSection, GetVersionExW, GetModuleFileNameW, ResetEvent, WaitForSingleObject, WaitForMultipleObjects, CreateThread, SetEvent, GetCurrentProcess, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, GetCommandLineW, GetCurrentProcessId, GetTickCount, LoadLibraryExW, VirtualProtect, SetFilePointer, WriteFile, CreateFileW, GetTempFileNameW, GetSystemTimeAsFileTime, IsBadReadPtr, MultiByteToWideChar, GetModuleHandleW, LoadLibraryA, lstrlenW, FindClose, FindNextFileW, DeleteFileW, FindFirstFileW, CopyFileW, CreateDirectoryW, GetFileAttributesW, GetCurrentThread, FormatMessageW
msvcrt.dll
DllMain
rpcrt4.dll
RpcBindingSetAuthInfoExW, RpcStringFreeW, RpcBindingFromStringBindingW, RpcStringBindingComposeW, RpcBindingFree, NdrClientCall2
shell32.dll
SHGetFolderPathW
user32.dll
LoadStringW, wsprintfW, CharUpperW
Export table
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
FFExit
FFInit
FFScanScript
InitInstallCheck
UninitInstallCheck

scriptsn.20130129194430.dll

VSCORE by McAfee (Signed)

Remove scriptsn.20130129194430.dll
Version:   VSCORE.14.4.0.387.x86
MD5:   f6d5f156e1de7a3cd11276ea8e69c2a4
SHA1:   f5ada65c64304ac5e3fd7177ef31931d4029bb72
SHA256:   a9bde81a54a57c8779af8e7728aa35fabf4d0f769e923c6f3b228a043eb81649

Overview

scriptsn.20130129194430.dll is loaded as dynamic link library that runs in the context of Internet Explorer. It is installed in Internet Explorer as a Browser Helper Object (BHO) which has full acess to the web browser's behaviors and content. The file is digitally signed by McAfee which was issued by the VeriSign certificate authority (CA). This particular version is usually found on Windows 7 Home Premium (6.1.7601.65536).

DetailsDetails

File name:scriptsn.20130129194430.dll
Publisher:McAfee, Inc.
Product name:VSCORE
Description:VSCore Script Scanner
Typical file path:C:\Program Files\common files\mcafee\systemcore\scriptsn.20130129194430.dll
File version:VSCORE.14.4.0.387.x86
Size:77.88 KB (79,744 bytes)
Certificate
Issued to:McAfee
Authority (CA):VeriSign
Effective date:Wednesday, October 5, 2011
Expiration date:Tuesday, December 31, 2013
Digital DNA
PE subsystem:Windows GUI
File packed:No
Code language:Microsoft Visual C++
.NET CLR:No
More details

BehaviorsBehaviors

Internet Explorer Browser Helper Object
Located in the registry at 'SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects'
  • BHO CLSID: {7DB2D5A0-7241-4E79-B68D-6309F01C5231}

Windows OS versionsDistribution by Windows OS

OS versiondistribution
Windows 7 Home Premium 100.00%
Should I remove It? Clean your PC of unwanted adware, toolbars and bloatware.

Download it for FREE